A viral app known as Neon, which provides to report your cellphone calls and pay you for the audio so it will possibly promote that information to AI corporations, has quickly risen to the ranks of the top-five free iPhone apps since its launch final week.
The app already has hundreds of customers and was downloaded 75,000 occasions yesterday alone, in line with app intelligence supplier Appfigures. Neon pitches itself as a method for customers to generate profits by offering name recordings that assist practice, enhance, and check AI fashions.
However now Neon has gone offline, no less than for now, after a security flaw allowed anybody to entry the cellphone numbers, name recordings, and transcripts of another consumer, information.killnetswitch can now report.
information.killnetswitch found the security flaw throughout a brief check of the app on Thursday. We alerted the app’s founder, Alex Kiam (who beforehand didn’t reply to a request for remark in regards to the app), to the flaw quickly after our discovery.
Kiam informed information.killnetswitch later Thursday that he took down the app’s servers and commenced notifying customers about pausing the app, however fell in need of informing his customers in regards to the security lapse.
The Neon app stopped functioning quickly after we contacted Kiam.
Name recordings and transcripts uncovered
At fault was the truth that the Neon app’s servers weren’t stopping any logged-in consumer from accessing another person’s information.
information.killnetswitch created a brand new consumer account on a devoted iPhone and verified a cellphone quantity as a part of the sign-up course of. We used a community site visitors evaluation device known as Burp Suite to examine the community information flowing out and in of the Neon app, permitting us to grasp how the app works at a technical degree, comparable to how the app communicates with its back-end servers.
After making some check cellphone calls, the app confirmed us an inventory of our most up-to-date calls and the way a lot cash every name earned. However our community evaluation device revealed particulars that weren’t seen to common customers within the Neon app. These particulars included the text-based transcript of the decision and an internet deal with to the audio information, which anybody may publicly entry so long as they’d the hyperlink.
For instance, right here you possibly can see the transcript from our check name between two information.killnetswitch reporters confirming that the recording labored correctly.

However the backend servers have been additionally able to spitting out reams of different folks’s name recordings and their transcripts.
In a single case, information.killnetswitch discovered that the Neon servers may produce information about the newest calls made by the app’s customers, in addition to offering public net hyperlinks to their uncooked audio information and the transcript textual content of what was stated on the decision. (The audio information comprise recordings of simply those that put in Neon, not these they contacted.)
Equally, the Neon servers could possibly be manipulated to disclose the newest name data (also called metadata) from any its customers. This metadata contained the consumer’s cellphone quantity and the cellphone variety of the individual they’re calling, when the decision was made, its period, and the way a lot cash every name earned.
A evaluate of a handful of transcripts and audio information suggests some customers could also be utilizing the app to make prolonged calls that covertly report real-world conversations with different folks so as to generate cash by way of the app.
App shuts down, for now
Quickly after we alerted Neon to the flaw on Thursday, the corporate’s founder, Kiam, despatched out an electronic mail to clients alerting them to the app’s shutdown.
“Your information privateness is our primary precedence, and we wish to be certain it’s absolutely safe even throughout this era of speedy progress. Due to this, we’re briefly taking the app down so as to add additional layers of security,” the e-mail, shared with information.killnetswitch, reads.
Notably, the e-mail makes no point out of a security lapse or that it uncovered customers’ cellphone numbers, name recordings, and name transcripts to another consumer who knew the place to look.
It’s unclear when Neon will come again on-line or whether or not this security lapse will achieve the eye of the app shops.
Apple and Google haven’t but responded to information.killnetswitch’s requests for remark about whether or not or not Neon was compliant with their respective developer tips.
Nonetheless, this is able to not be the primary time that an app with severe security points has made it onto these app marketplaces. Just lately, a preferred cellular relationship companion app, Tea, skilled a data breach, which uncovered its customers’ private info and government-issued id paperwork. Standard apps like Bumble and Hinge have been caught in 2024 exposing their customers’ areas. Each shops additionally should often purge malicious apps that slip previous their app evaluate processes.
When requested, Kiam didn’t instantly say if the app had undergone any security evaluate forward of its launch, and if that’s the case, who carried out the evaluate. Kiam additionally didn’t say, when requested, if the corporate has the technical means, comparable to logs, to find out if anybody else discovered the flaw earlier than us or if any consumer information was stolen.
information.killnetswitch moreover reached out to Upfront Ventures and Xfund, which Kiam claims in a LinkedIn publish have invested in his app. Neither agency has responded to our requests for remark as of publication.



